Google Hijack – Pt. Two; Session Hijack in Nine Minutes
Purpose: Perform a session hijacking attack Description:Use gathered information to carry out a session hijacking attack on a Google account through a local network, using one blogger account to...
View ArticleGoogle Hijack – Pt. One; The Process
Purpose: Establish goals for session hijacking Description: Thought process and reconnaissance of performing a web based session hijacking attack on a local network. My Thinking Recently I had...
View ArticleSSH Remote Tunneling
The following will demonstrate the setup of an OpenSSH box, which will be enabled for remote connections. Reasoning for SSH Instead of bogging down a laptop or other local machine with tools and memory...
View ArticleMetasploit & distcc Exploitation, Part 01
Distcc distcc is a daemon process distributes compilation of C code across several machines on a network. It is also vulnerable. Part 01 of this article will deal with the exploitation process of...
View ArticleMetasploit & distcc Exploitation, Part 02
A system has been compromised, but that’s only a small part in the grand scheme of exploitation. Metasploit’s post modules exist to gather credentials, configuration files, etc. from a compromised...
View ArticleSimplify Bash; .bash_aliases
Make Life Less Bashful What’s below will demonstrate the use of a .bash_aliases file. This could possibly brighten one’s day for years straight. Bash Profile Aliases: This sources ~/.bash_aliases to...
View Article
More Pages to Explore .....